Sunday, February 28, 2016

I have been called the Queen of Light--this title being simply another level of initiation which may come to you and your own twin flame. For the signifying tittle "king" or "queen" are those who have the right to rule because they contain within their hearts and souls a certain God-mastery of the threefold flame and therefore hold the key to the opening of that flame in those who are the ruled....
As you have been the mantle bearers and intend to be the embodiment of the gift of prophecy you may understand the function of a prophet in a society as the watchman of the LORD to ignite hearts and quicken them to a sensitivity--socially, politically, educationally, morally and finally spiritually. The prophet is the one who alerts a people to the absence of application of spiritual law to the human condition and therefore points out injustice and the way to God-justice. -Queen of Light: July 2 or 3, 1982 at Camelot, Los Angeles by C. Sindelar

Some financial institutions may be considered “too big to fail,” but contemporary Western society may be too frivolous to survive....It is bad enough to hear someone boasting about his past achievements. What is truly repulsive is hearing someone boasting about the future achievements he thinks he is going to have, as Donald Trump does repeatedly....
Some Americans will never appreciate America until after they have helped destroy it, and have then begun to suffer the consequences. 11-18-15 http://spectator.org/articles/64695/america-very-serious-trouble
..........................................................

9-15-15 The presidency is too important a role for someone as frivolous as Trump, the "Desperado" actress argued.

“We’re talking about a president who has to deal with a world that has a lot of very strong international conflicts, and they’re going to have to interact with it,” she said.

“We could spend three weeks doing a special on all the things that concern me about the world,” Hayek added. “It’s everywhere you look — it’s chaos.”

“There are so many things that concern me about the world. I’m proud that it concerns me. Because there are a lot of people who are not concerned.”

Hayek also charged that Americans take too narrow a view of the world around them, despite its impact on their lives.

“I feel like the interest of the majority of America about the world is quite small,” she said.

“They don’t understand that we are in a world crisis, economically, politically, socially, and we need to take a look at that, too,” Hayek said.

“We can’t just be occupied,” she added. “It’s become a show business, politics in America." http://thehill.com/blogs/blog-briefing-room/news/254238-salma-hayek-trumps-surge-shows-america-is-in-trouble

.....................................................

Yes, Trump is pretty weird, but what of this stuff?:

Olympics 2008

white house 1981

VIOLATIONS: 18 U.S. Code § 242 - Deprivation of rights under color of law

JEFF HAUBRICH.COM

Then you HW Bush sabotaged John John’s, 1999 Piper Saratoga II TC, HTTP://WWW.TOMFLOCCO.COM/FS/PURGETHEEVIL.HTM , you sabotaged John John’s plane to silence him just as you silenced your business partners’ planes of Mohammed bin Laden September 3, 1967; and, Mohammed’s son Salem bin Laden died from plane accident on May 29, 1988, northeast of San Antonio before HW Bush’s U.S. Presidential run (NOTE: Federal Judge John H. Wood Jr., also killed May, 29,1979- May 29 is JFK’s birthday). Your CIA planes created 911 so that you could continue looting the United States!

peacocks, usually blue and green feathered, are found in Java, India, Sri Lanka and Burma and on Youtube

The new Beijing rules for China (effective on March 10) call for all online publishers to "carry forward socialist core values" and spread ideology, morality and knowledge "that improve the quality of the nation and promote economic development." -WSJ: 2-22-2016, page B3, "China Tightens Reins on Web Publishers"
..................................................................................................

2-23-16 Foreign companies in China, especially in media, face political resistance in China. The country's military newspaper calls the Internet the most important front in an ideological battle against "Western anti-China forces".

Many of the world's biggest Internet platforms, like Alphabet Inc's Google services, Facebook Inc and Twitter Inc, are inaccessible in China.

In recent years, Beijing has pursued a raft of laws and regulations, including a new national security law and a draft cyber security law, that have raised the hackles of foreign business groups fearful that China could compel companies to turn over crucial intellectual property to the government in the name of security. http://www.reuters.com/article/us-china-internet-idUSKCN0VW106

................................................

As the sky changes, as the seasons come and go, as outer manifestations vanish in the light of cosmic progress step by step the hand of God will guide you through Hierarchy, through the angelic hosts and through the greatest complement of God that is the humblest expression of Himself. -Archangel Jophiel: Pearls of Wisdom 13:38 (His retreat with Archeia Christine is in the etheric near Lanchow.)

Saturday, February 27, 2016

Feb. 22, 2016 The likely deployment of powerful radar by China on an island in the South China Sea signifies the Chinese regime’s attempt at “effective control” over the disputed waters, the home to many competing maritime claims and crucial shipping lanes, according to an American think tank. http://www.theepochtimes.com/n3/1973911-why-chinese-radar-not-missiles-is-a-game-changer-in-the-south-china-sea/
...............................................................................................http://atimes.com/2016/02/china-can-unstealth-us-fighter-jets-in-spratlys/
..........................................................................................................
........................................................................
The Strait of Malacca is a narrow waterway between Malaysia and Sumatera island of Indonesia. Virtually the entire commercial sea traffic between the Far East and Europe, the Middle East, and India and passes through the Strait of Malacca....
And so, in the fall of 1995, Beijing is proceeding on an accelerated implementation of its ambitious and multi facetted program to consolidate control over the Strait of Malacca as a key to controlling the China Sea, the eastern Indian Ocean and chocking Western commercial traffic. Even the completion of the first phase, in which Chinese forces stay out of the Strait themselves, will put Beijing in effective control over this major choke point. Subsequent steps by the PRC and its allies to complete the surge have demonstrated a sophisticated combination of use of military power in peacetime with the exploitation of state-sponsored terrorism to achieve strategic tangible results.
The Spratly Islands -- the Nansha Islands in Chinese -- is a multitude of small islands and reefs, mostly uninhabited, that spread over a vast area (700km by 600km) between the coasts of Vietnam and the Philippines (Palawan island), just north of Malaysia and Indonesia (Sabah island). These islands have long been claimed by numerous countries, each of which presently occupies a few islands and reefs within the huge ocean space. The importance of the Spratly Islands grew in the late 1980s following the discovery of huge oil fields -- conservatively estimated at 100 million barrels -- just underneath the ocean space. The importance of these oil deposits will significantly grow, both economically and strategically, as the overall economy and especially industrialization of east Asia continues to expand at a rapid pace.
The new era of the importance of the Spratly Islands was heralded in 1988, when the PLA Navy in two brief clashes (March and November) seized six positions near Johnson Reef from the North Vietnamese and attacked Vietnamese naval patrols respectively. The Johnson Reef is placed at the center of the Spratly Islands. By the early 1990s, the PLA High Command was operating in accordance with Beijing's growing sense of urgency. One of the first major projects reflecting growing interest in activities in the South China Sea was the major upgrading of SIGINT collection capacity. At first, the large SIGINT complex on Hainan Island was vastly expanded. Then, the PRC built another SIGINT station on rocky Island (Shi-tao) near Woody Island (Lin-tao) in the Paracel Islands. This is the highest point in the area, and the local station vastly improves coverage of the entire Spratly Islands area, the Philippines, and the Strait of Malacca. These new facilities were largely operational in the summer of 1995.
Meanwhile, the PLA began taking a closer look at contingency plans to consolidate control over the Spratly Islands. They found them to be a daunting challenge because of the PLA's acknowledged military shortfalls -- particularly the absence of high performance air power (from aircraft carriers or far away land bases). Indeed, the milestone July 1993 book Can the Chinese Army Win the Next War? stressed "how urgent and complex the Nansha Islands question is for China's Naval leaders. However, the new generation of leaders, filled with a strong spirit of nationalism, will never abandon their efforts to bring about the return of the Nansha Islands to the bosom of the motherland." http://www.freeman.org/m_online/bodansky/beijing.htm

2-18-2016 Furthermore, asking Apple to see its source code is not the same as giving China Apple's source code; for such an audit, there is no reason to believe Apple just handed China the source code for its entire operating system. The more likely scenario that Apple would let Chinese engineers examine its software under the supervision of Apple engineers without actually turning the software over.http://www.macobserver.com/tmo/article/reuters-gets-it-wrong-on-apple-encryption-and-china
.....................................................
2-17-2016 In January 2015, the state-run newspaper People’s Daily claimed, in a tweet, that Apple had agreed to security checks by the Chinese government. This followed a piece in the Beijing News (link in Chinese) that claimed Apple acceded to audits after a meeting between Cook and China’s top internet official, Lu Wei. China’s State Internet Information Office would reportedly be allowed to perform “security checks” on all Apple products sold on the mainland. According to the report, this was despite Cook’s assurances that the devices didn’t contain backdoors accessible by any government, including the US....

Cook has said on earnings calls that he believes the Greater China region, which includes Taiwan and Hong Kong along with the mainland, will eventually become Apple’s biggest market. Some could get the impression that Apple capitulated to Beijing’s security demands because it wanted access to a huge and growing market.Instead of addressing those rumors head on, Apple didn’t say either way whether it had agreed to a Beijing security audit. Apple didn’t respond immediately to Quartz’s attempts to confirm those reports at the time, and said weeks later it could not comment on them. When contacted today, an Apple spokesperson pointed Quartz to the company’s privacy policy, which states that the company has never worked with any government to create a backdoor to its products. “We have also never allowed any government access to our servers. And we never will,” the policy reads.
That’s in stark contrast to the company’s forthright approach elsewhere in the world....Why the different approach in China? To be clear, Apple hasn’t said that it agreed to special security checks by Beijing. But that’s precisely the problem. Its silence regarding Beijing’s security demands, but its vocal resistance to requests from other governments, contributes to a perception that it has different security standards for different markets–even when that may not be the case. http://qz.com/618371/apple-is-openly-defying-us-security-orders-but-in-china-it-takes-a-very-different-approach/
.................................................................
10-20-2014 This is clearly a malicious attack on Apple in an effort to gain access to usernames and passwords and consequently all data stored on iCloud such as iMessages, photos, contacts, etc. Unlike the recent attack on Google, this attack is nationwide and coincides with the launch today in China of the newest iPhone. While the attacks on Google and Yahoo enabled the authorities to snoop on what information Chinese were accessing on those two platforms, the Apple attack is different. If users ignored the security warning and clicked through to the Apple site and entered their username and password, this information has now been compromised by the Chinese authorities....
This latest MITM attack may be related to the increased security aspects of Apple’s new iPhone. When details of the new iPhone were announced, we felt that perhaps that the Chinese authorities would not allow the phone to be sold on the mainland. Ironically, Apple increased the encryption aspects on the phone allegedly to prevent snooping from the NSA. https://en.greatfire.org/blog/2014/oct/china-collecting-apple-icloud-data-attack-coincides-launch-new-iphone
.............................................................................................
Actually, in China, because the usual excuse for censorship is that it promotes a harmonious society, I tend to lead with a discussion about how the censorship program leads to disharmony. I want to push them to rethink their principles from scratch. https://en.greatfire.org/blog/2015/sep/greatfire-qa-jimmy-wales-china-censorship
........................................................................................................................
In March of this year, Google found unauthorized digital certificates for several Google domains. The root certificate authority for these domains was the China Internet Network Information Center (link is external) (CNNIC). CNNIC was controlled by the Chinese government through the Ministry of Industry and Information Technology (link is external) and is now under the management of the Cyberspace Administration of China (link is external) (CAC). CNNIC was recognized by all major browsers as a trusted Certificate Authority. If CNNIC signs a fake certificate used in a man-in-the-middle attack, no browser will warn of any unusual activity unless the certificate is pinned.
After Google found these unauthorized certificates, both Google and Firefox revoked its trust in CNNIC a few days later, a development we at GreatFire.org have adovacting forsince2013. Apple and Microsoft on the other hand, did not revoke their trust in CNNIC, nor did they make any announcements regarding the security compromise.
In June 2015, Apple quietly published a support article titled “About the security partial trust allow list (link is external)”. This announcement was made quietly and as far as we can see was not picked up in the media. We did not notice this change until this week. Apple states in the support article that “an intermediate certificate was incorrectly issued by the certificate authority CNNIC. This issue was addressed through the addition of a mechanism to partially trust a CA by trusting only a set of certificates.” This is the same strategy that has been taken by Google and Firefox to block CNNIC.
Apple also published the full domain list (link is external) signed by CNNIC which might be interesting to researchers.
Microsoft is the only major browser operator left that still trusts CNNIC-issued CAs. Microsoft pointed to a help article (link is external) when requested for comment. Microsoft didn’t indicate any action against CNNIC in the article. We urge Microsoft to revoke CNNIC following Google, Mozilla and Apple's lead and limit CNNIC's authority to the domain list published by Apple. https://en.greatfire.org/blog/2015/sep/apple-blocked-cnnic-ca-months-after-mitm-attacks
.........................................................................................................http://qz.com/620076/beijing-is-banning-all-foreign-media-from-publishing-online-in-china/
..............................................................................................................................Apple Pay will help China’s mammoth state banks crush Alibaba offline
But Apple is going to have a huge advantage. A major partner is UnionPay, an offspring of China’s central government, which holds a monopoly on bank card payments for domestic lenders. 19 Chinese banks—including China’s biggest bank, ICBC—announced in December they plan to support Apple Pay. http://qz.com/618230/apple-pay-will-help-chinas-mammoth-state-banks-crush-alibaba-offline/
.....................................................................................................................

Friday, February 26, 2016

Bill Gates said that government should not be left blind, that Apple should help the government. http://www.latimes.com/business/technology/la-fi-tn-bill-gates-apple-20160223-story.html

response to Gates:

1) The government has NSA to consult with on all matters related to encryption, so they hare hardly been left blind unless they blind themselves. 2) Encryption is mathematical at root, so the issue is not a USA issue anyway. 3) As to the ongoing and intensifying electronics/IT era and its hurdles to face, the period of ~1945-75 was more appropriately the time to decide which road to take in terms of IT. IT is now so worldwide that it’s too late by far for FBI or even one government to affect profoundly the IT development path; however if Chinese Communists and East Coast Establishment insiders have covertly teamed up together then certainly a lot of trouble is ahead. -R.

.................................................................

2-26-2016 In January 2015, the government mouthpiece, the People's Daily, tweeted a picture of Apple Chief Executive Tim Cook shaking hands with Lu Wei, China's top cyberspace official.

"Apple has agreed to China's security checks, 1st foreign firm to agree to rules of Cyberspace Admin of China," the tweet said. http://www.latimes.com/business/technology/la-fi-apple-china-20160226-story.html

Apple CEO Tim Cook and Lu Wei, director of China’s Internet Information Office, shaking hands in a meeting in December last year (Weibo.com/Caijing)

“Apple might hand over its source code to the Chinese government,” said Charlie Smith (a pseudonym), one of the activists of GreatFire.org in an email. Great Fire is a non-profit organization that monitors online censorship in China. http://www.theepochtimes.com/n3/1215318-apples-products-to-undergo-security-inspection-by-china/

Wednesday, February 24, 2016

1-7-16
A federal judge has ordered a new trial for Chicago police who killed Darius Pinex, a twenty-seven year-old black father of three, during a traffic stop on January 7, 2011. The officers were found not guilty by a jury in February 2015, however, a city lawyer “intentionally concealed” crucial evidence from lawyers for the Pinex family.
The details of misconduct and the order for a new trial are stunning developments in a city. As with the shooting of Laquan McDonald, the city is implicated in another clear cover-up to protect officers from being held responsible. In fact, following the judge’s order, the city lawyer, Jordan Marsh, resigned. http://www.mintpressnews.com/rampant-corruption-in-chicago-pd-sparks-new-murder-trial-for/212544/
...................................................
10-14-2010 NEW YORK (AP / CBS 2) – The fiancee and friends of an unarmed man killed in a 50-bullet police shooting on his wedding day said they wanted justice. The legal system gave them money – more than $7 million.
The city did what it has done time and time again: pay.
Nearly $1 billion has been paid over the past decade to resolve claims against the nation’s largest police department, according to an investigation by The Associated Press. Some smaller departments also shell out tens of millions a year in payouts, but New York’s spending on police claims dwarfs that of any other U.S. city.
Taxpayers foot the bill – New York officials say the payments cost less than insurance would, and officers themselves don’t usually bear personal responsibility.
The $964 million in payouts covers everything from brutality cases to patrol-car wrecks to stationhouse accidents, and it includes settlements and trial awards. Some police officers have been sued again and again – including one officer at least seven times on excessive force and brutality claims. http://newyork.cbslocal.com/2010/10/14/nypd-paid-nearly-1-billion-to-settle-lawsuits/
................................................................................
12-4-15 In Marksville, Louisiana, for example, two deputy city marshals were charged with second-degree murder after authorities reviewed video from one of the officers' body cameras, which showed a man with his hands in the air inside a vehicle when the marshals opened fire. The man was severely wounded and his 6-year-old autistic son killed. http://www.huffingtonpost.com/entry/police-shooting-charges_us_5661b436e4b079b2818e4765

gneiss in center
.............................................................................................................................
Edgar Camacho-Alvarez--6 versions of his death in Albuquerque